30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

Most Downloaded in Recent Year
Please wait a minute...
For Selected: Toggle Thumbnails
Prediction of Total Ionospheric Electron Content Based on Informer
MA Yan LIU Hai-jun HE Ren CUI Chun-jie WANG Gao-yuan YANG Yue-qiao
Computer & Telecommunication    2024, 1 (1): 17-20.   DOI: 10.15966/j.cnki.dnydx.2024.z1.008
Abstract146)            Save
Related Articles | Metrics
Research on Teaching Reform of Data Structure Based on OBE
LU Hong LIU Hong-ying
Computer & Telecommunication    2022, 1 (4): 29-.   DOI: 10.15966/j.cnki.dnydx.2022.04.005
Abstract160)            Save
Related Articles | Metrics
Computer & Telecommunication    2023, 1 (1-2): 70-.   DOI: 10.15966/j.cnki.dnydx.2023.z1.012
Abstract185)            Save
Related Articles | Metrics
Design of Wechat Applet User Management System Based on Springboot
YANG Yu XU Wan-ming
Computer & Telecommunication    2022, 1 (3): 63-.   DOI: 10.15966/j.cnki.dnydx.2022.03.023
Abstract562)            Save
Related Articles | Metrics
Review of Image Dehazing Algorithms
CHEN Jun-an LU Geng-you XIE Qian-yi GONG Zhi-hui LIU Jian-ping PENG Shao-hu
Computer & Telecommunication    2022, 1 (7): 63-.   DOI: 10.15966/j.cnki.dnydx.2022.07.012
Abstract257)            Save
Related Articles | Metrics
The Security of Linux Server Deployment
Shen Lixiang
Computer & Telecommunication    2016, 1 (11): 50-52.  
Abstract310)            Save
This paper briefly introduces the Linux system, and puts forward some specific measures to solve the security of the server. It includes five aspects: user rights configuration, system service configuration, firewall configuration, system optimization and log management. In the user configuration, the order strategies of user, password, logout and permissions are proposed; in the service configuration, the solutions of the motherboard, Bluetooth, network interface and storage are put forward; it is proposed that the firewall should be kept open; in the system optimization, the optimization strategies of the swap partition, management interface network and IP logo are proposed; it puts forward a series of commands in the log management. It is hoped that the Linux server security and deployment discussed in this paper can provide reference for practical operation.
Related Articles | Metrics
Design and Implementation of Student Award System Based on Spring Boot + Vue
WANG Jin LV Tai-zhi
Computer & Telecommunication    2021, 0 (10): 52-55.   DOI: 10.15966/j.cnki.dnydx.2021.10.013
Abstract1275)            Save
Higher vocational colleges carry out all kinds of award activities for students every year. How to have a fair and efficient award system is of great significance to students and counsellor. It can not only stimulate learning enthusiasm of student, but also reduce work burden of counsellor and effectively save human costs. For improving the award efficiency, this paper designs and implements a student award system. This system adopts B/S architecture, uses the front-end and back-end separation mode. The back-end is realized by Spring Boot + MyBatis, the front-end is realized by Vue framework. The front-end and back-end realize data interac tion with JSON format through Ajax technology. The database MySQL is read and written by MyBatis.
Related Articles | Metrics
Design and Implementation of Campus Ordering Backend System Based on Microservice
SU Bing
Computer & Telecommunication    2023, 1 (11): 23-28.   DOI: 10.15966/j.cnki.dnydx.2023.11.008
Abstract302)            Save
In order to alleviate the problem of seat tension in university canteens, it is urgent to develop a kind of software to solve this problem and improve the dining experience for students. This article discusses the use of the current mainstream microservice framework Spring Boot, combined with technologies such as MyBatis Plus and Vue.js, to design and implement a campus ordering system backend, which facilitates platform administrators and merchant administrators to manage dishes, packages, orders, etc., providing a solution for the problem of tight dining for college students.
Related Articles | Metrics
Design of Driver Fatigue Recognition Algorithm Based on YOLOv8 and Face Key Points Detection
HE Zong-xi JIANG Ming-zhong XIE Ming-xia PANG Jia-bao CHEN Qiu-yan HU Yi-bo
Computer & Telecommunication    2023, 1 (11): 1-6.  
Abstract531)            Save
According to statistics, the accident rate caused by fatigue driving and mental inconcentration in traffic accidents accounts for 93%. To solve this problem, 68 key points of face are introduced in this paper. Based on deep learning and machine vision algorithm concepts, combined with YOLOv8 model and related fatigue driving judgment mechanism, PERCLOS algorithm, MAR algorithm, EAR algorithm and HPE algorithm are used to improve the accuracy and reliability of the system. A set of algorithms for recognizing tired driving behavior is successfully constructed.
Related Articles | Metrics
A Named Entity Recognition Model Based on Rotational Attention
LAI Xiao-meng WEI Jia-yin
Computer & Telecommunication    2024, 1 (1): 21-25.   DOI: 10.15966/j.cnki.dnydx.2024.z1.011
Abstract151)            Save
Addressing the issue of inadequate classification accuracy in named entity recognition via entity word-to-relationship modeling, we propose a method using rotational attention. Firstly, the text is encoded using the BERT model and Bi-LSTM, fol‐ lowed by extraction of features from input text using convolutional neural networks. Subsequently, the extracted feature sequence is inputted into the rotational attention model for output probability calculations, and the MLP layer is used for output classification. The study's outcomes affirm the efficacy and feasibility of the technique proposed in this paper, as it successfully yields superior re‐ sults on mainstream English databases including CADEC, GENIA and CoNLL2003, for named entity recognition exercise. 
Related Articles | Metrics
Safety Helmet Detection Based on Lightweight YOLOv8
ZHANG Bi-chuan LIU Wei-dong MI Hao JING Ya-ning
Computer & Telecommunication    2024, 1 (1): 35-39.   DOI: 10.15966/j.cnki.dnydx.2024.z1.017
Abstract340)            Save
Helmet detection is a computer vision task with important application value, involving safety management in many fields such as construction sites, mines, and electric power. However, helmet detection also faces many challenges, such as large changes in target size and aspect ratio, rapid changes in target velocity, target occlusion, and background interference. In order to solve these problems, this paper proposes a safety helmet detection method based on YOLOv8, which uses the characteristics of high speed and high precision of YOLOv8 combined with the characteristics of safety helmets to achieve effective detection and identification of safety helmets.
Related Articles | Metrics
Facial Expression Recognition Algorithm Based on Multi-scale Feature Deep Learning
WANG Jin WANG Rui
Computer & Telecommunication    2024, 1 (5): 75-.   DOI: 10.15966/j.cnki.dnydx.2024.05.013
Abstract112)            Save
Recognizing emotions through facial expressions has been widely applied in normal life. Among deep learning algo‐ rithms, Convolutional Neural Networks (CNN) have achieved great success in the field of facial expression recognition. However, it still faces the problem of information redundancy and data deviation, which affects the performance of facial expression recognition algorithm. Therefore, a Multi-scale Image Convolutional Network (GCN) based on landmarks extracted from facial images is pro‐ posed. The proposed method is simulated on CK+, JAFFE, FER2013 and RAF-DB datasets. The results show that the proposed method is superior to AUDN, BDBN, SCNN and other traditional deep learning frameworks, and has higher accuracy on different data sets.
Related Articles | Metrics
Design of Intelligent Home Control System Based on STM32
LIZhi-kai JIANGGui-sheng YU Li-hong LIJian-hua
Computer & Telecommunication    2018, 1 (12): 4-7.  
Abstract431)            Save
In order to design a smart home control system that is easy for users to use, this system takes STM32F103 microcontroller as the control center and combines hc-05 Bluetooth module, non-ad hoc voice recognition module and GSM module to form a set of multi-functional control system.The system usesMQ-2 smoke sensor, HC-SR501 human induction module, DHT11 temperature and humidity sensor and relay to detect and process the indoor environment, and then displays the indoor environment status through TFT display screen.The system can control indoor lighting, curtains and fans through mobile phones with Bluetooth function and user voice.In an emergency, alert the user by sending an alarm text message within 10 seconds using the GSM network. The system has the advantages of good performance, simple operation, low cost and so on.
Related Articles | Metrics
Research on Intelligent Financial System Based on OCR and Large Language Model
HUANG Zi-cong CHEN Dian-can OU Run-feng LUO Jing PENG Xin-dong
Computer & Telecommunication    2024, 1 (1): 1-3.   DOI: 10.15966/j.cnki.dnydx.2024.z1.005
Abstract205)            Save
With the rapid development of information technology and the growing demand for financial management and financial analyses, bookkeeping is no longer limited to ordinary handwriting or manual recording in software. In order to meet the needs and development of today's era, an intelligent financial system based on OCR and large language model is designed. The system is suit‐ able for mobile phones, with financial management functions as the starting point and simplified management operations as the pur‐ pose, and realizes a system that is mainly based on OCR recognition scanning and recording bookkeeping functions, supplemented by financial analysis functions of big language model, big data consumption classification trends, and multi-version switching of ver‐ sions suitable for people of different age groups. The system not only greatly improves the efficiency of people's bookkeeping, but also promotes the intelligent financial transformation of society.
Related Articles | Metrics
Research on the Design and Application of "VR+AI" Education Service Platform
WAN Chen
Computer & Telecommunication    2021, 1 (12): 38-41.   DOI: 10.15966/j.cnki.dnydx.2021.12.008
Abstract298)            Save
The integration of virtual reality and artificial intelligence is a new trend in future education development. The article starts
with analyzing the problems faced in the development of smart campus, and proposes a novel "VR+AI" mode of education service
platform in response to the existing problems. It discusses on the goal of the "VR+AI" education service platform construction indepth, designs the "VR+AI" education service platform model, overall technical architecture and functions, and analyzes the multiple application scenarios of the service platform in education and teaching. The platform can accelerate the construction of smart campuses in universities, promote the deep integration of teaching, management, service, campus life and information technology,and promote the connotative development of universities.

Related Articles | Metrics
Research on Course Fusion Mode Based on Holographic Projection Technology
YANG Su-hui LUO Shao-ye
Computer & Telecommunication    2024, 1 (3): 41-.   DOI: 10.15966/j.cnki.dnydx.2024.03.007
Abstract122)            Save
In traditional teaching, due to differences in teachers, the knowledge connections between different courses are often over‐ looked, resulting in excessive repetition or failure to integrate new and old knowledge points. To make the knowledge points more smoothly connected in teaching, we help students to establish a knowledge connection system. Firstly, we organize a teaching salon where teachers fill out a teaching knowledge connection table to find fusion points between courses. Secondly, we use holographic projection technology to build a holographic projection pyramid. Finally, we use holographic projection during the teaching to help students recall previously learned knowledge and better integrate it with new knowledge, and understand new information. To sum up, holographic projection technology visualizes models in courses, deepens students' impressions, increases visual stimulation dur‐ ing learning, and enhances students' interest in learning. This innovative form of teaching tool and teaching method helps to deepen students' understanding and absorption of knowledge.
Related Articles | Metrics
The Literature Review about Sentiment Analysis in Network Public Opinion Research in China
YOU Dan-dan LUO Shao-ye
Computer & Telecommunication    2024, 1 (3): 64-.   DOI: 10.15966/j.cnki.dnydx.2024.03.006
Abstract216)            Save
With the popularization of the internet and social media, the impact of network public opinion on the social level cannot be underestimated, and sentiment analysis in network public opinion is of utmost importance. This paper collects, organizes, and summarizes relevant literature on sentiment analysis in network public opinion research in China, adopting bibliometric methods to analyze the quantity of literature, co-occurrence of high-frequency keywords, and evolution of theme keywords. Following the pro‐ cess of sentiment analysis in network public opinion research, this study analyzes the main research content, ideas, and methods in data collection, data processing, sentiment recognition(classification/tendency),sentiment evolution. Finally, this study points out fu‐ ture research directions, and gives the working directions of next steps.
Related Articles | Metrics
The Implementation of IPv6 Network Deployment and IPv4 Network Security Reinforcement for Web Application Systems Based on Intelligent DNS and Reverse Proxy
WU Guo-song
Computer & Telecommunication    2024, 1 (3): 7-.   DOI: 10.15966/j.cnki.dnydx.2024.03.001
Abstract149)            Save
Based on the core technology of the next generation Internet IPv6, which has the characteristics of large enough address space, higher security, better service quality and supporting mobile terminal equipment, the information development of universities is gradually promoting the IPv6 network deployment and IPv6 network application of information system. However, in the process of promoting IPv6 network deployment and access of application systems in universities, there are still some problems that some un‐ derlying network devices do not support IPv6 protocol, and security devices cannot achieve comprehensive control. In order not to change the current school network architecture, without affecting the current IPv4 network access, this paper puts forward the imple‐ mentation of IPv6 network deployment and access for college Web application system based on the intelligent DNS and reverse proxy. This technology has the characteristics of simple principle, strong stability, high security and easy maintenance. Through link‐ age deployment, IPv6 network access and IPv4 access security reinforcement of the school application system are realized, which provides reference practice for the deployment of IPv6 network application.
Related Articles | Metrics
Research on Electronic Reading Room Seat Reservation System
Based on J2EE in Higher Vocational College
LI Kai WANG Xin-ke
Computer & Telecommunication    2022, 1 (5): 84-.   DOI: 10.15966/j.cnki.dnydx.2022.05.018
Abstract169)            Save
Related Articles | Metrics
ProfiNet Communication Control Realization Based on the S7-1200 and SmartLink Remote IO
Zhong Guobiao, Xu Lianying
Computer & Telecommunication    2017, 1 (6): 25-28.  
Abstract341)            Save
The SIEMENS S7-1200 PLC is connected with the SmartLink adapter by five kinds of twisted pair cable, so as to realize the remote control of IO module in communication, and realize data exchange in the same ProfiNet Industrial Ethernet bus. This paper introduces the framework of the control system, the topological structure of SmartLink remote intelligent IO in detail; introduces how to complete hardware configuration, parameter setting and data transmission in SIEMENS TIA Portal software; and completes the management control of distributed IO actuators with FB.
Related Articles | Metrics
Computer & Telecommunication    2023, 1 (1-2): 98-.   DOI: 10.15966/j.cnki.dnydx.2023.z1.016
Abstract215)            Save
Related Articles | Metrics
Aerial Vehicle Detection in Low Light Environment Based on Yolov5
XIN Bo-fu
Computer & Telecommunication    2024, 1 (1): 78-83.   DOI: 10.15966/j.cnki.dnydx.2024.z1.010
Abstract124)            Save
An improved algorithm is proposed to address the problem that yolov5 detects UAV aerial images with poor monitoring performance for low light background targets. Firstly, data normalization is performed on the target dataset visdrone2019 to improve the detection effect. Then the dynamic convolution kernel with Mish activation function and the C3_DSConv module using distrib‐ uted offset convolution to replace the C3 block are introduced, and the above two convolution structures are fused into the yolov5 network; the BiFormer attention mechanism is embedded to improve the accuracy of small target detection. In summary, the MODByolov5 model is finally obtained, and the experimental results prove that the model's mAP and recall are both improved, and the ac‐ curacy of detecting vehicles in shadows and dark environments is significantly increased, and the FPS is high, which ensures that the model can still be used for rapid detection or real-time monitoring.
Related Articles | Metrics
CSI-based Indoor Localization Method Using IDW Interpolation and Amplitude-phase Fusion Network
RU Chun-rui DANG Xiao-chao
Computer & Telecommunication    2024, 1 (3): 1-6.  
Abstract170)            Save
To address the problem of poor localization performance caused by the small number of fingerprint points and the lack of representativeness of fingerprint features in the offline phase of fingerprint-based indoor localization, a CSI-based indoor localiza‐ tion method is proposed using Inverse Distance Weighted (IDW) interpolation and amplitude-phase fusion network. The IDW inter‐ polation algorithm is used to generate a large-capacity fingerprint library. Then, a parallel convolutional neural network (CNN) is used to process the amplitude and phase to obtain the positional fingerprint features. Finally, a novel integrated architecture fusing Random Forest (RF) and Multilayer Perceptron (MLP) is used for classification to obtain the estimated positions of the target loca‐ tion samples.
Related Articles | Metrics
Analysis of Public Sentiment in Libraries Based on Text Mining
WANG Long-jun WANG Jing LI Guang-hua CHEN Liang
Computer & Telecommunication    2024, 1 (3): 13-.   DOI: 10.15966/j.cnki.dnydx.2024.03.020
Abstract119)            Save
With the increasing influence of mobile Internet on young readers in university libraries, the proportion of new generation readers using QQ instant messaging software is increasing, text mining of library QQ group text information can be used to under‐ stand the public sentiment of the library, which can be used for library public sentiment warning and provide strong public sentiment response capabilities for library decision-makers. Web crawler technology is used to crawl chat records in QQ groups from Septem‐ ber 2022 to December 2022 as library public sentiment data, then performing data preprocessing operations such as deduplication and cleaning on the original public sentiment data. Then, Tsinghua University's Thulac segmentation technology is used to extract keywords and calculate their weights from the public sentiment data, and them the WordCloud library is used for visualization. Next, the spaCy library is used to to calculate specific emotional tendencies and scores for public opinion data, and finally the emotional tendencies of library public opinion are analyzed through experiments.
Related Articles | Metrics
Experimental Teaching Reform of Performance Test Course Based on LoadRunner
ZHANG Li LI Ju
Computer & Telecommunication   
The Questionnaire Survey System with Separation Technique of Front and Back Ends Based on Vue.js
ZHU Xiao-yu CHEN Si ZHANG Kai ZHOU Chen-jun WANG Hong-bo
Computer & Telecommunication   
Facial Feature Test and Fatigue Driving Warning Based on Deep Learning
ZHANG Miao-miao CHAI Guo-qiang YU Hai-le XU Hao-xuan
Computer & Telecommunication    2022, 1 (12): 1-.   DOI: 10.15966/j.cnki.dnydx.2022.12.001
Abstract260)            Save
Fatigue driving is an invisible killer of road traffic safety. A fatigue driving detection system based on deep learning is pro
posed in this paper to ensure the high efficiency and accuracy of detection. First, OpenCV is applied to gray preprocess the collected
image. Second, directional gradient histogram is used to extract feature and the pre-trained Dlib model is applied to calibrate 68 face
feature points. Finally, the improved detected algorithms of blink, yawn and nod are used to calculate the length width ratio of eyes
and mouth and head posture Euler angle, respectively, and compare with its corresponding threshold to determine whether the driver
is in fatigue state and take early warning measures. Experiments show that the proposed system has 97% accuracy, verifying its ef
fectiveness.

Related Articles | Metrics
Research on Upgrading Method of E-government Extranet Based on SPN and Super SIM Zero Trust Security Gateway
WANG Ning GUO Gong-hua
Computer & Telecommunication    2024, 1 (1): 56-61.   DOI: 10.15966/j.cnki.dnydx.2024.z1.006
Abstract151)            Save
Government extranet is an important infrastructure of e-government in China. In the new era, Guangdong Province pro‐ poses to build a new generation government extranet with "resilience, comprehensive integration and extensive coverage", which puts forward higher requirements for the coverage, stability and security of the network. Therefore, combining SPN technology and Super SIM zero trust security gateway technology, this paper discusses the planning, design and construction of a new generation of government extranet.
Related Articles | Metrics
Computer & Telecommunication    2024, 1 (3): 93-.   DOI: 10.15966/j.cnki.dnydx.2024.03.017
Abstract141)            Save
Related Articles | Metrics
Research and Design of the Humidifier Intelligent Control System
GU Wen YAN Jun-jie
Computer & Telecommunication   
Computer & Telecommunication    2024, 1 (3): 65-.   DOI: 10.15966/j.cnki.dnydx.2024.03.015
Abstract125)            Save
Related Articles | Metrics
Public Opinion Dissemination and Public Opinion Control Model Based on SEIR Model
QIAN Yi-ji HOG Lei ZHANG Yu-rui
Computer & Telecommunication    2022, 1 (6): 53-.   DOI: 10.15966/j.cnki.dnydx.2022.06.016
Abstract119)            Save
Related Articles | Metrics
Four-step Matlab Modeling of 3D Woven Composites
HU Jia-bin
Computer & Telecommunication    2024, 1 (5): 14-.   DOI: 10.15966/j.cnki.dnydx.2024.05.018
Abstract101)            Save
Based on the basic principles of the four-step method (1×1) weaving technology, a detailed analysis is conducted on the periodic motion of the yarn carrier and the trajectory of the yarn in space during the weaving process. Utilizing Matlab software, two binary variables are defined to track the regular movement of the yarn carrier in a programmatic form. Based on a series of hypotheti‐ cal conditions for the yarn, the internal structure of three-dimensional woven composite materials is represented using an inner cell characterization, and a three-dimensional four-directional structure unit cell model is established. Meanwhile, by providing the spa‐ tial coordinates of the yarn, the modeling of the three-dimensional woven composite material preform is completed using Texgen software.
Related Articles | Metrics
Research on Software Integration Testing Based on LDRATBrun
Computer & Telecommunication   
Research and Application of Anti-fraud Model Based on Big Data of Communication Operator
LIU Hui-fang
Computer & Telecommunication    2021, 1 (7): 46-52.   DOI: 1008-6609(2021)07-0046-07
Abstract180)            Save
In response to the increasing demand for prevention and control of communication fraud cases, an anti-fraud model based on operator big data is proposed to identify fraudulent users. This model uses operator big data to analyze user information and extract typical characteristics of telecom fraud and builds an anti-fraud model based on machine learning algorithms. In addition, the performance of the model is evaluated based on the 360 network platform data, showing that the model can effectively identify fraudulent users with high accuracy.
Related Articles | Metrics
Current Situation Analysis and Hot Research on Second-hand Housing Market Based on Python Crawler -- A Case Study in Nanjing
FENG Chong-jun
Computer & Telecommunication    2021, 0 (10): 65-68.   DOI: 10.15966/j.cnki.dnydx.2021.11.010
Abstract410)            Save
This paper uses Python third-party library Requests to crawl the housing data of second-hand housing websites, uses Pandas library to structurally process the crawled data, and uses Pyechards library to conduct multi-dimensional in-depth analysis and visual presentation of second-hand housing data. From a large number of online data, this paper analyzes the distribution of secondhand houses, market hot spots and price trend in Nanjing, helps buyers and real estate agents to make efficient decisions in market activities, and provides reference for government intervention and supervision of the second-hand housing market.

Related Articles | Metrics
Object Detection of Traffic Road Based on Fog
GUAN Yao ZHU Kai
Computer & Telecommunication    2022, 1 (5): 69-.   DOI: 10.15966/j.cnki.dnydx.2022.05.024
Abstract201)            Save
Related Articles | Metrics
Research on Introducing Educational Robots into C Language Programming Teaching
XIE Chang-ying WANG Chun-ling
Computer & Telecommunication    2024, 1 (1): 14-16.   DOI: 10.15966/j.cnki.dnydx.2024.z1.013
Abstract128)            Save
By analyzing the problems in the traditional teaching mode of C Language Programming, this paper discusses the teach‐ ing framework and implementation plan of applying educational robots to C Language Programming teaching, and discusses the transformation of teacher roles.By introducing educational robots, it is possible to stimulate students' interest in learning, mobilize their internal drive for learning, improve their problem-solving ability, strengthen their teamwork awareness and innovative spirit, and effectively improve teaching effectiveness.
Related Articles | Metrics
Design of Accounting Risk Prevention of Financial Terminal Application System
HE Guang-rong CHI Feng-li ZHENG Ming-du
Computer & Telecommunication    2018, 1 (12): 78-83.  
Abstract188)            Save
This research is proposed on the analysis and classification of the account risk of the financial terminal to put forward the corresponding design principles and schemes of risk prevention. A new generation of a unified platform for financial terminal application integrating accounting risk prevention is developed, which is applied to the operation of tens of thousands of financial terminals of a large domestic bank. Practice shows that the risk prevention scheme proposed in this research can effectively enhance the financial security of banks and users and can significantly reduce the number of accounting disputes between banks and financial end-users.
Related Articles | Metrics
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd